In my last post, we spoke about Advanced Search and Discovery. Even though data can be recognizable and descriptive, what counts is that we make good use of them for tracking and analysis. Therefore, metadata, which are data that summarize and describe other data, can be extremely helpful.
Nowadays, users can and often upload various media files to social networks, websites, and messaging apps. Most of those media are images and videos, with a significant number being audio files. Subsequently, to create a thumbnail to depict an image, a site or app would crop and then resize it to scale. To depict a video, they would convert, crop, and resize a single frame from it as a thumbnail.
In my last post, we spoke about Access Control. With Cloudinary’s digital asset management (DAM) solution, you can, with just a few keystrokes from your Cloudinary dashboard, perform advanced search on the media assets (images and videos) you’ve uploaded to the Media Library and retrieve the ones you desire. This article shows you how.
“Anything you can do, I can do better,
I can do anything better than you…” (Irving Berlin)
If the Cloudinary CLI could sing, this could well be its song. Virtually anything you can do with the Cloudinary upload and admin APIs, you can do with the CLI (Command Line Interface), and much of the functionality that’s available through your account console is also accessible through the CLI. As to being ‘better’, it probably depends on the context, but in many situations it’s certainly quicker and easier, and it provides some bonus functionality that isn’t available through the APIs or console.
In my last post, we spoke about AI-Based Content Analysis. Now, given the importance of security and privacy, authentication is at the heart of virtually all software. Access control is the layer on top of authentication that determines who can access what. Why is access control necessary? Because within most organizations nowadays is a multitude of digital assets stored in various folders, and functional teams need access to some of those assets to do their work even though their access to private assets must be restricted. Complexity arises as a result, especially during cross-functional collaboration among developers and other teams.